posted by user: 743zh2k || 2120 views || tracked by 1 users: [display]

FTRA WCC 2010 : [CALL FOR PARTICIPATION] The 2010 FTRA International World Convergence Conference 2010 (FTRA WCC 2010)

FacebookTwitterLinkedInGoogle

Link: http://www.ftrai.org/wcc2010/
 
When Dec 9, 2010 - Dec 11, 2010
Where Gwangju, Korea
Submission Deadline TBD
Categories    convergence   pervasive   security   SMART
 

Call For Papers

%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

CALL FOR PARTICIPATION

%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

The 2010 FTRA International World Convergence Conference 2010 (FTRA WCC 2010)

- Gwangju, Korea, December 9-11, 2010 -

http://www.ftrai.org/wcc2010/

%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

CONFERENCE DESCRIPTION

The 2010 FTRA International World Convergence Conference (FTRA WCC 2010) will be held
in will be held in Gwangju, Korea, December 9-11, 2010. The Conference is aimed at
addressing key themes on "Technologies and Services for Converged environments".
WCC 2010 chairs are very pleased to inform you that WCC 2010 has completed the paper
review process and more than 170 people have registered so far before the
registration deadline November 15. This year the WCC 2010 will take place in Gwangju,
the ancient Capital of Korea, from 9-11 Dec. 2010, with the following key features:


Topics Covered:

+ Cryptography and Security for Converged environments
+ Wireless sensor network for Converged environments
+ Multimedia for Converged environments
+ Smartphone for Converged environments
+ Bio-inspired computing for Converged environments
+ U-Healthcare for Converged environments

%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

ORGANIZATION

Steering Chair:
+ James J. Park, Seoul National University of Science and Technology (SeoulTech), Korea

General / General-vice Chairs:
+ Han-Chieh Chao, National Ilan University, Taiwan
+ Sang-Soo Yeo, Mokwon University, Korea
+ Laurence T. Yang, St Francis Xavier University, Canada
+ Jong Suk Ahn, Dongguk University, Korea
+ Bezalel Gavish , Southern Methodist University, USA
+ Jianhua Ma, Hosei University, Japan
+ Young-Sik Jeong, Wonkwang University, Korea

Program Chairs:
+ Jin Kwak, Soonchunhyang University, Korea
+ Shiguo Lian, France Telecom R&D Beijing, China
+ Sajid Hussain, Fisk University, USA
+ Seungmin Rho, Korea University, Korea
+ Isaac Woungang , Ryerson University, Canada
+ Bernady O. Apduhan , Kyushu Sangyo University, Japan
+ Hang-Bae Chang, Daejin University, Korea
+ Hosin Lee, University of IOWA, USA
+ Jaewoo Kang, Korea University, Korea
+ Mi Young Nam, Inha University, Korea
+ Yang Sun Lee, Chosun University, Korea
+ Sumi Helal, Program Co-Chair, University of Florida, USA
+ Deok Gyu Lee, ETRI, Korea

Local Chairs:
+ Sang Yep Nam, Kookje College, Korea
+ Jong An Park, Chosun University, Korea
+ Tae Sun Choi, Gwangju Institute of Science anc Technology, Korea
+ Seong Ro Lee, Mokpo National University, Korea
+ Yong Sun Moon, Sunchon National University, Korea
+ Soo Hyung Kim, Chonnam National University, Korea
+ Chulwon Kim, Honam University, Korea


Continuing the tradition of its successful predecessors, the program of
WCC-10 will include:

- Keynotes by Prof. Nazim Agoulmine, Prof. S. Shyam Sundar, and Prof. Kiseon Kim
- Research Tracks with 158 research papers presenting for in-depth discussion
of advanced research topics.
- A great social program to encourage informal discussion among peers.

We invite you to attend WCC-10!

%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

INVITED SPEAKER (http://www.ftrai.org/wcc2010/invited.html)

Dr. Nazim Agoulmine (University of Evry, France)
- Challenges in U-Care and U-Health Smart Homes for Elderly:
Convergence of Technologies as an Effective Approach

Dr. S. Shyam Sundar (Pennsylvania State University, USA)
- The Psychology of Convergence, New Environments, New Meanings

Dr. Kiseon Kim (GIST, Korea)
- Challenges in Underwater Sensor Networks and the 3-dimensional Localization Issue
Using Mobile Beacons

%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

List of WCC 2010 Workshops:

+ International Symposium on Advances in Cryptography, Security and Applications
for Future Computing (ACSA-10)
Site: http://www.ftrai.org/acsa2010

+ International Workshop on Smartphone Applications and Services (Smartphone 2010)
Site: http://www.ftrai.org/smartphone2010

+ International Symposium on Wireless sensor network Technologies and Applications
for Smart Space (WTA 2010)
Site: http://www.ftrai.org/wta2010

+ International Workshop on Advanced Future Multimedia Services (AFMS 2010)
Site: http://www.ftrai.org/afms2010

+ International Workshop on Bio-inspired computing for Hybrid Information Technology
(BHIT 2010)
Site: http://www.ftrai.org/bhit2010

+ International Workshop on U-Healthcare Technologies and Services (U-Healthcare 2010)
Site: http://www.ftrai.org/uhealthcare2010


%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

CONFERENCE LOCATION & WEB SITE
Gwangju is the leading city of the Honam region, which is being sought for its
cutting-edge industry and culture, and a core middle city leading the development of
the southwestern region. For a long time Gwangju has been known as a hometown of
justice, art and beauty because citizens have never turned a blind eye to injustice
and enjoy art, flavor and taste.
You can see more specific information with the following link.
http://eng.gwangju.go.kr/tourist/main.jsp

Conference web site: http://www.ftrai.org/wcc20100/
Travel & Hotel Reservation site: http://www.ftrai.org/wcc2010/travel.html
Registration site:
http://www.ftrai.org/acsa2010/registration.html (ACSA 2010)
http://www.ftrai.org/smartphone2010/registration.html (Smartphone 2010)
http://www.ftrai.org/wta2010/registration.html (WTA 2010)
http://www.ftrai.org/afms2010/registration.html (AFMS 2010)
http://www.ftrai.org/bhit2010/registration.html (BHIT 2010)
http://www.ftrai.org/uhealthcare2010/registration.html (UHealthcare 2010)

%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
CONTACT

For further information regarding the workshop and paper submission, please contact:
ftra.secretary01@gmail.com or ftra.secretary02@gmail.com

%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

Accepted Paper Lists

[ACSA 2010]
1. Fine-Grained User Access Control in Ciphertext-Policy Attribute-Based Encryption
2. Privacy Preserving Frequent Itemsets Mining via Secure Collaborative Framework
3. Security Analysis and Enhancement for Three-party Authenticated Key Exchange Protocol
4. Threat Scenario-Based Security Risk Analysis using the Use Case Modeling in Information Systems
5. Security Analysis of an Ultra-lightweight RFID Authentication Protocol--SLMAP
6. Cloud-DLS: Dynamic Trusted Scheduling for Cloud Computing Based on Bayesian Cognitive Method
7. Convertible Ring Signatures with Gradual Revelation of Non-Signers
8. Adaptive-capacity and Robust Natural Language Watermarking For Agglutinative Languages
9. Differential Fault Analysis on Block Cipher SEED
10. Results on Rotation Symmetric Functions over GF(p)
11. A Novel User Authentication and Privacy Preserving Scheme with Smart Cards for Wireless Communications
12. On Weaknesses of the HDCP Authentication and Key Exchange Protocol and Its Repair
13. Task-based Behavior Detection of Illegal Codes
14. Authenticated Public Key Broadcast Encryption Scheme Secure Against Insiders' Attack
15. Secure Key Establishment & Mutual Authentication In WPAN (SKEMA)
16. Modeling and Quantitatively Predicting Software Security Based on Stochastic Petri Nets
17. A Scalable and Privacy-preserving Child-care & Safety Service in Ubiquitous Computing Environment
18. Fault Detection and DFA Countermeasure for Montgomery Power Ladder in ECC
19. Adaptively Secure Identity-based Broadcast Encryption with constant size private keys and ciphertexts from the Subgroups
20. A New Multistage Approach to Detect Subtle DDoS Attacks
21. Secure Concurrency Control Protocol with Timeliness Guarantees in Real-Time Database Systems
22. Securing Mobile Network Prefix Provisioning for NEMO based Vehicular Networks
23. Authentication Protocol using Identifier in Ad-hoc Network Environmente
24. Improving Performance of Network Covert Timing Channel through Huffman Coding
25. Related Key Chosen IV Attacks on Decimv2 and Decim-128
26. Mining Constraints in Role-Based Access Control
27. AS Alliance Based Security Enhancement for Inter-domain Routing Protocol
28. BLESS: Object Level Encryption for Secured Object-Based Storage System
29. A Novel Method for SQL Injection Attack Detection Based on Removing SQL Query Attribute Values
30. Discrete Logarithm Problem using Index Calculus Method
31. Enhanced Secure Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks
32. Photography Forensic Approaches Based on Optical Illusions and a Signal Processing Technique
33. The Effect and Strategy Research of the Secure E-Commerce by the Application of P2P
34. Evaluating Trustworthiness of Prefix Announcements in Internet Routing
35. Generic Construction of Identity-Based Strong Key-Insulated Signature
36. Towards Implicitly Thwarting Stealth Malware with a Feather-weight Hypervisor
37. Improved Hierarchical Identity-Based Parallel Key-Insulated Encryption
38. An Interaction Vulnerability Detection Model in Large Distributed System Based on Finite State Machine
39. Diffusion-Confusion based Light-weight Security for Item-RFID Tag-Reader Communication
40. Lightweight Access Control for Resource Limited Clients on Valid XML Data Streams
41. Non-Linear Approximations in Differential-Multiple Linear Cryptanalysis
42. Designing User Profiling Prototype for Identification of Malicious Forums
43. Detecting Memory Leak Using Virtualization Technology
44. Cryptanalysis of Grain
45. A more practical remote user authentication scheme using smart cards
46. A Study on Windows Malicious Code Classification System
47. Differential-Multidimensional Linear Cryptanalysis
48. Reconfigurable Hardware Implementation of a Simple Authentication Protocol for a Wireless Sensor Networks Platform
49. Related Key Chosen IV Attack on Modified Version of SNOW2.0
50. Immune-inspired Pattern Recognition Algorithm of Roving Agents for Anomaly Detection
51. An Efficient Privacy-Preserving Identity-Based Broadcast Signcryption for Large-Scale Wireless Sensor Networks
52. Integral Cryptanalysis of Reduced-Round MIBS Block Cipher
53. Breaking the Spacing Based Authentication Protocol
54. Even-variable Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity
55. Reliable Reputation Measure based on Feedback Ratings for E-business Application
56. Development to Protection Model from Large-Scale Information Leakage in Web Environments
57. Integrating Intrusion Detection and Access Control Systems: A survey
58. Fingerprint Verification using Geometric Hashing and Principal Component Analysis
59. AGVUS Ultra-Lightweight Mutual Authentication Protocol for Low-cost RFID Tags
60. Visualization of Abnormal Behavior Detection using Parallel Coordinate and Correspondence Analysis
61. Reversible Data Hiding for Halftone Images Using Histogram Modification
62. OpenID Based Personal Information Management System
63. A Tool Implementation Applied by PF Architectural Pattern to Integrate the Open Source Software for the Static Analysis
64. Design and Implementation of Code Virtualization for Binary Code Protection
65. Cryptanalysis of improved simple three-party key exchange protocols
66. A Scalable and Robust Hierarchical Key Establishment Scheme for Mission-Critical Applications over Sensor Networks
67. The Study on a Convergence Security Service for Manufacturing Industries
68. A Security Model for IPTV with One-Time Password and Conditional Access System for Smart Mobile Platforms
69. Handling Malicious Flooding Attacks through Enhancement of Packet Processing Technique in Mobile Ad Hoc Networks
70. Guess and Determine Attack on Bivium
71. Generic Constructions for Strong Designated Verifier Signature
72. Virus Detection Method based on Behavior Resource Tree
73. EAACS: A Proactive and Adaptive Access Control Scheme for Parallel Multiple Emergencies Management of CPS applications
74. A Method of Risk Assessment for Multi-Factor Authentication

[WTA 2010]
75. Extracting and Visualizing Human Activity Patterns of Daily Living in a Smart Home Environment
76. Power-Aware Scheme for Reliable Data Delivery in Wireless Sensor Networks
77. Activity-driven Optimized Bus Specific Clock Gating for Ultra-Low-Power Smart Space Applications
78. Real-Time Low Bitrate Multimedia Communication For Smart Spaces and Wireless Sensor Networks
79. Pair-wise Key Management in Heterogeneous Sensor Networks
80. Specified Nearest Neighbor Query Processing in WSNs-based Smart Spaces
81. Collaborative Routing and Camera Selection for Visual Wireless Sensor Networks
82. Real-time Physiological and Vision Monitoring of Vehicle Driver for Nonintrusive Drowsiness Detection
83. ITFBS: Adaptive Intrusion-tolerant Scheme for Body Sensor Networks in Smart Space Application
84. Implementation of SOPC Embedded System for Wireless Sensor Networks Control Center with uClinux Operating System
85. Smart Device Applying Self-adaptation Technologies for Smart Space
86. On Implementation of the IEEE 802.15.4 Module with CFP in NS-2
87. A study on PVDF sensor using wireless experimental system for bridge structural local monitoring
88. Storage-efficient Data Gathering in Wireless Sensors
89. A Study of Context-Based Adaptive Service Model in Home Environments
90. Medium Reservation based Sensor MAC protocol for Low Latency and High Energy Efficiency
91. A Novel Scheme to Prevent MAC Layer Misbehavior in IEEE 802.11 Ad Hoc Networks
92. Attack Containment in Mobile Ad-hoc Networks through Fair
93. Towards More Reliable and Secure Source Routing in Mobile Ad Hoc and Sensor Networks
94. An Enhanced Two-Factor User Authentication in Wireless Sensor Networks
95. A circular polarization antenna design for improving the reception of UHF RFID reader
96. The Biometric based Convertible Undeniable Multi-Signature Scheme to Ensure Multi-Author Copyrights and Profits
97. Power-efficient M-ary PSSK communications
98. Wireless LAN Access Point Placement based on User Mobility
99. Mobile SMS Spam Filtering
101. The impacts of an electronic marketplace with multiple independent retailers for smart grocery ordering systems
102. Ontology based Resource Usage Policy Matching in Computational Grid for Pervasive Computing Applications
103. Human Abnormality Detection for Smart Spaces using Motion Sequence Matching
104. A Polygon Reduction Method for Improving Accuracy of Ranging-Based Indoor Localization System
105. Efficient Signal Detection Scheme Based on Spreading Sequence for LED-ID Systems
106. Tunnel Restraint to Prevent Out-of-Order Packets for Route Optimization in Proxy Mobile IPv6
107. Routing Protocol for Heterogeneous Hierarchical Wireless Multimedia Sensor Networks
108. Energy Efficient Distributed Face Recognition in Wireless Sensor Network
109. Dynamic Voltage and Frequency Scaling for Power-Constrained Design using Process Voltage and Temperature Sensor Circuits
110. Adaptive Motion Vector Smoothing for Improving Side Information in Distributed Video coding
111. Guard-Border Cut Detection Algorithm in Wireless Sensor Network
112. Security Framework for RFID-based Applications in Smart Home Environment

[AFMS 2010]
113. Data Reorganization for Scalable Video Service with Embedded Mobile Devices
114. Color Division Method By Neo-Impressionist Manner
115. A Novel Secure RF4CE Communication for Efficient Multimedia Control in Smart Home Embedded Systems
116. Area-Efficient Convolutional Deinterleaver for Mobile-TV Receiver
117. ENFFiS: An Enhanced NAND Flash Memory File System for Mobile Embedded Multimedia System
118. Physical Activity Recognition using Multiple Sensors Embedded in a Wearable Device
119. An intrinsic semantic framework for recognizing image objects
120. A Middleware for Projector-based Procedure-aware Tabletop Applications
121. Evaluating Two Implementations of the Component Responsible for Decoding Video and Audio in the Brazilian Digital TV Middleware
122. A Study on Block-based Recovery of Damaged Digital Forensic Evidence Image
123. The Study on Content Based MuItimedia Data Retrieval System
124. TZCD-MBOK Watermarking Scheme for Disaster Broadcasting Service in T-DMB System
125. Tertiary hash tree: hash-based index structure for high-dimensional data
126. Strategies for Global Commercialization of the WiBro Service Based on the Delta Model and ANP
127. Application of Semantic Web Technologies for Automatic Multimedia Annotation
128. Recommender System Design using Movie Genre Similarity and Preferred Genres in SmartPhone
129. Multimodal Concept Fusion using Semantic Closeness for Image Concept Disambiguation
130. English Course E-learning System Based On Relative Item Difficulty Using Web Component Composition
131. Lifting a Metadata Model to the Semantic Multimedia World
132. A Cultural Dimensions Model Based on Smart Phone Applications
133. A Multi-dimensional UI Design for Content Browser on Mobile IPTV

[Smartphone 2010]
134. ANON - a Twitter for products
135. Sketching up the world: In-situ authoring for mobile Augmented Reality
136. Android Runtime Security Policy Enforcement Framework
137. Resuscitating Privacy-Preserving Mobile Payment with Customer in Complete Control
138. PowerPedia
139. Mobile Exploration of Geotagged Photos
140. Secure and Efficient Public Key Management In Next Generation Mobile Networks
151. A Smartphone Watch for Mobile Surveillance Service
152. Performance Analysis of Authentication and Key Distribution Scheme for Mobile Multi-hop Relay in IEEE 802.16j
153. Recovery method of Deleted Record for SQLite Database
154. An Efficient and Low Cost Windows Mobile BSN Monitoring System Based on TinyOS
155. Ensuring Anonymity for LBSs in Smartphone Environment

[U-Healthcare]
156. Security Requirements and Standard Architecture Design for u-health Device
157. Design an Efficient Routing Strategy for VANETs in a City Environment
158. Medicare-Grid: A Grid Based E-Health System
159. TOL-PTEQ for In-sufficient Cyclic-prefix OFDM Transmissions
160. Self-Decision Activity in Hierarchical Wireless Sensor Networks
161. ECG Dipole Source Localization in 3D Human Model
162. A Software Architecture for Collaborative Visualization Environments
163. Error-resilient Transmission of Patient Video over Mobile Network
164. A Study on a Portable Health Monitoring System with Wristband using Photoplethysmograph and Skin Temperature

[BHIT]
165. LGTBase: LARGE-like GlcNAc-transferase Database
166. Feature Extraction for Termite Tunneling Using Information Relevance and GA
167. SignatureClust: A Tool for Landmark Gene-guided Clustering
168. Putative Xylosyltransferase Genes in Trichomonas vaginalis
169. Effects of 12-Weeks Circuit Weight Training and Aerobic Exercise on Body Composition, Physical Fitness, and Pulse Wave Velocity in Obese Collegiate Women

Related Resources

IEEE WSAI 2024   IEEE--2024 the 6th World Symposium on Artificial Intelligence (WSAI 2024)
IEEE COINS 2024   IEEE COINS 2024 - London, UK - July 29-31 - Hybrid (In-Person & Virtual)
IITUPC 2024   Immunotherapy and Information Technology: Unleashing the Power of Convergence
CSW 2024   2024 3rd International Conference on Cyber Security
IITUPC 2024   Immunotherapy and Information Technology: Unleashing the Power of Convergence
CEVVE 2024   2024 2nd International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2024)
Migrating Minds 2025   Migrating Minds. Journal of Cultural Cosmopolitanism, Issue 4, Spring 2025
IJCI 2024   Call for Conference Proceedings - International Journal on Cybernetics & Informatics
IOTCB 2024   3rd International Conference on IOT, Cloud and Big Data
SRF Online 2024   SRF Conference Series 2024 - Filling and Surrounding the World: Pan(en)theism in a Scientific Age